Images List Premium Download Classic

Public Key

Public Key-related patent applications - as published by the U.S. Patent and Trademark Office (USPTO).


loading
Authenticating features of virtual server system
International Business Machines Corporation
June 15, 2017 - N°20170171164

Technical solutions are described for authenticating a hosting system prior to securely deploying a shrouded virtual server. An example method includes receiving, by a hypervisor, a request for a public certificate, from a client device that requested the virtual server, and sending the public certificate of the hosting system that executes the hypervisor. The method also includes receiving, in response ...
Token key infrastructure and method
International Business Machines Corporation
June 15, 2017 - N°20170170962

A token key infrastructure and a method using polymorphic executable or its variants for the exchange of digital information, including digital data and digital executable codes, over network or internet in a secure way with the use of dynamism, polymorphism and dynamic polymorphism, as well as integrating with public key infrastructure where considered appropriate for the protection of intellectual property ...
Selective encryption of transactional information for different participants of an electronic transaction
Paypal, Inc.
June 15, 2017 - N°20170169425

Transactional information regarding a transaction to be performed by a plurality of parties is obtained. For each party, respective privileges for viewing different portions of the transactional information are determined. Each party is restricted to view only the portion of the transactional information to which the party has the privilege. A plurality of unique public keys is received for the ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Mic verification method in d2d communications and d2d communications system
Xi'an Coolpad Software Scientific Co., Ltd.
June 08, 2017 - N°20170164189

An mic verification method in d2d communications and a d2d communications system include: a monitoring ue receives a discovery announcement message from an announcing ue, in which the discovery announcement message carries a 32-bit mic, and the mic is a signature value obtained when the announcing ue conducts, by using a private key, a digital signature on a ...
A trusted geolocation beacon and a method for operating a trusted geolocation beacon
"billennium" Spolka Z Ograniczona Odpowiedzialnoscia
June 08, 2017 - N°20170164142

A method for operating a trusted geolocation beacon, the method comprising the steps of: generating (101) a public and private keys pair associated with the beacon; associating a unique identifier with the beacon; transmitting (104) the public key associated with the unique identifier to an external device; cyclically transmitting (201) beacon's identifier as well as its transmitter's signal power (202); transmitting (302) a signal comprising ...
Method and device for cryptographic key generation
Thomson Licesing
June 08, 2017 - N°20170163420

A method and a device for generation of a cryptographic key pair for use in a (generalized) goldwasser-micali cryptosystem. The device generates a first prime p≡1 (mod 2k), where k≧1 is an integer, and a second prime q≡3 (mod 4) or q≡1 (mod 4); computes a modulus n=pq; picks an integer y∈n\n, where n ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
System and method for partner key management
Jpmorgan Chase Bank, N.a.
June 08, 2017 - N°20170161737

A system and method for implementing an interoperable credential management protocol for processing online transactions. The protocol, referred to as the partner key management (pkm) protocol provides an improved alternative to traditional public key infrastructure (pki), particularly for use in high-value commercial transactions which require additional controls on the use of credentials for authentication and authorization. According to the pkm ...
Secure remote kernel module signing
Red Hat, Inc.
June 08, 2017 - N°20170161502

Implementations for a secure remote kernel module signing are disclosed. In one example, the method includes receiving an indicator of a public key associated with a client computing device, determining that the public key associated with the client computing device is in common with a public key associated with a first server computing device, compiling the script, signing the compiled ...
Information processing apparatus, control method for information processing apparatus, and storage medium
Canon Kabushiki Kaisha
June 01, 2017 - N°20170155626

An apparatus includes a memory device that stores a set of instructions, and at least one processor that executes the instructions to perform control to cause a storage unit to store a digital certificate issued by a certification authority, release a public key whose validity is certified by the digital certificate and perform encrypted communication with an external apparatus using ...
Trusted platform module (tpm) protected device
Microsoft Technology Licensing, Llc
June 01, 2017 - N°20170155513

Example apparatus and methods provide a device (e. G., smartphone) that is more secure for electronic commerce. An example device includes a trusted platform module (tpm) that stores a public key and a private key. The device is provisioned with account information, user information, and device information. The tpm uses the account, user, and device information to acquire attestation credentials ...
Embedded security architecture for process control systems
Honeywell International, Inc.
June 01, 2017 - N°20170155511

An apparatus includes a first distributed control system (dcs) node. The first dcs includes at least one interface configured to communicate, over a network, with a second dcs node. The first dcs node also includes at least one processing device. The processing device is configured to exchange a security association policy with the second dcs node. The processing device is ...
Cryptographic communication system and cryptographic communication method
Renesas Electronics Corporation
June 01, 2017 - N°20170155508

Provided is a cryptographic communication system including a first semiconductor device and a second semiconductor device. The first semiconductor device includes a common key generation unit that generates a common key ck(a) by using a unique code uc(a) and correction data cd(a), and an encryption unit that encrypts the common key ck(a) generated in the common ...
Sponsored trust relationship management between multiple racks
Renesas Electronics Corporation
May 25, 2017 - N°20170149765

A new management node associated with a new rack sends at least a public key of the new management node to a first management node associated with a first rack and a plurality of autonomous management nodes. The first management node sends the new management node an access token trusted by at least a portion of the plurality of autonomous ...
Public Key Patent Pack
Download 182+ patent application PDFs
Public Key Patent Applications
Download 182+ Public Key-related PDFs
For professional research & prior art discovery
inventor
  • 182+ full patent PDF documents of Public Key-related inventions.
  • Exact USPTO filing data with full-text, images, drawings & claims.
  • Index pages: Table View and Image-Grid View layouts. All images in each PDF.
Method for deriving a verification token from a credential
Renesas Electronics Corporation
May 25, 2017 - N°20170149563

A method for deriving a verification token from a credential may be provided. The credential may be a set of attributes certified by an issuer to a user using a public key of the issuer. The method may comprise generating the verification token out of the credential and binding the verification token to a context string, wherein the verification token ...
Efficient two party oblivious transfer using a leveled fully homomorphic encryption
Renesas Electronics Corporation
May 25, 2017 - N°20170147835

A querying node generates public keys, secret keys, and switch key matrices. A public key associated with a first level and the switch key matrices are sent to a receiving node. The receiving node generates a key-value table, mapping values to keys, and encodes the keys and values using a polynomial ring of a predetermined type. The querying node encodes ...
Tokens for multi-tenant transaction database identity, attribute and reputation management
Renesas Electronics Corporation
May 25, 2017 - N°20170147808

One embodiment provides a method for token management in a multi-tenant transactional database, including: utilizing at least one processor to execute computer code that performs the steps of: receiving a request for one or more tokens to be used by an entity; verifying that the entity is qualified to receive the one or more tokens for use on the multi-tenant ...
Authentication mechanisms for wireless networks
Microsoft Technology Licensing, Llc
May 18, 2017 - N°20170142586

Security techniques and security mechanisms for wireless networks that transmit content such as advertisements. According to exemplary techniques, control messages comprising unrequested content (e. G., advertisement data) may be transmitted in response to a request from a client device, while in other exemplary techniques the control messages may be transmitted without any request from a client device. In some exemplary ...
Domain-server public-key reference
International Business Machines Corporation
May 18, 2017 - N°20170142105

A domain is identified from a communication address. The domain corresponds to a host name. Resource records associated with the host name are caused to be queried for a public key reference. The public key reference is received in response to the caused resource record query. A public key associated with the communication address is identified based on the public ...
Secure distribution of session credentials from client-side to server-side traffic management devices
F5 Networks, Inc.
May 18, 2017 - N°20170142100

A traffic management device (tmd), system, and processor-readable storage medium are directed to securely transferring session credentials from a client-side traffic management device (tmd) to a second server-side tmd that replaces a first server-side tmd. In one embodiment, a client-side tmd and the first server-side tmd have copies of secret data associated with an encrypted session between a client device ...
Systems and methods for employing rsa cryptography
F5 Networks, Inc.
May 18, 2017 - N°20170142084

A system that includes a client front end, a client server, and an authentication server, wherein the authentication server is configured to contains a public key to be employed for encryption of a license key, and the client server is configured to contain a private key to be employed for decryption of the license key.
Internet of things datapoint engine
Adobe Systems Incorporated
May 18, 2017 - N°20170142073

Techniques allow owners of internet of things (iot) devices to provide specific access to data from their iot devices to requesters of data. A request for data from one or more iot devices is received from one or more requesters, and the request is provided to the owner of the one or more iot devices. An indication of acceptance by ...
Loading